Filtered by vendor Procmail
Subscribe
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2014-3618 | 2 Canonical, Procmail | 2 Ubuntu Linux, Procmail | 2023-02-12 | 7.5 HIGH | N/A |
Heap-based buffer overflow in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted email header, related to "unbalanced quotes." | |||||
CVE-1999-0439 | 2 Caldera, Procmail | 2 Openlinux, Procmail | 2022-08-17 | 7.5 HIGH | N/A |
Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file. | |||||
CVE-1999-0475 | 1 Procmail | 1 Procmail | 2022-08-17 | 1.2 LOW | N/A |
A race condition in how procmail handles .procmailrc files allows a local user to read arbitrary files available to the user who is running procmail. | |||||
CVE-2017-16844 | 1 Procmail | 1 Procmail | 2018-02-03 | 10.0 HIGH | 9.8 CRITICAL |
Heap-based buffer overflow in the loadbuf function in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted e-mail message because of a hardcoded realloc size, a different vulnerability than CVE-2014-3618. | |||||
CVE-2001-0905 | 1 Procmail | 1 Procmail | 2017-10-09 | 6.2 MEDIUM | N/A |
Race condition in signal handling of procmail 3.20 and earlier, when running setuid, allows local users to cause a denial of service or gain root privileges by sending a signal while a signal handling routine is already running. |